Author of the publication

Image steganography for authenticity of visual contents in social networks.

, , , and . Multimedia Tools Appl., 76 (18): 18985-19004 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tertiary hash tree-based index structure for high dimensional multimedia data., , , and . Multimedia Tools Appl., 61 (1): 51-68 (2012)Inference topology of distributed camera networks with multiple cameras., , and . Multimedia Tools Appl., 67 (1): 289-309 (2013)Skin feature extraction and processing model for statistical skin age estimation., , , and . Multimedia Tools Appl., 64 (2): 227-247 (2013)Evaluating Skin Hereditary Traits Based on Daily Activities., , , , and . FCC, volume 301 of Lecture Notes in Electrical Engineering, page 261-270. Springer, (2014)Digital Watermarking Technique for Text Document Protection Using Data Mining Analysis., , , , , and . IEEE Access, (2019)SMERS: Music Emotion Recognition Using Support Vector Regression., , , and . ISMIR, page 651-656. International Society for Music Information Retrieval, (2009)MUSEMBLE: A novel music retrieval system with automatic voice query transcription and reformulation., , , and . J. Syst. Softw., 81 (7): 1065-1080 (2008)Cooperative mobile video transmission for traffic surveillance in smart cities., , , , and . Comput. Electr. Eng., (2016)A dynamic caching strategy for CCN-based MANETs., , , , , , and . Comput. Networks, (2018)A novel framework for social web forums' thread ranking based on semantics and post quality features., , , and . J. Supercomput., 72 (11): 4276-4295 (2016)